Pub Date : 2009-12-01DOI: 10.1109/ICCIT.2009.5407128
Moazzam Hossain, Sadia Al Haque, Farhana Sharmin
In order to improve the security by providing the stego image with imperceptible quality, three different steganographic methods for gray level images are presented in this paper. Four Neighbors, Diagonal Neighbors and Eight Neighbors methods are employed in our scheme. These methods utilize a pixel's dependency on its neighborhood and psycho visual redundancy to ascertain the smooth areas and edged areas in the image. In smooth areas we embed three bits of secret information. In the edged areas, variable rate bits are embedded. From the experimental results it is seen that the proposed methods achieve a much higher visual quality as indicated by the high Peak Signal-to-Noise Ratio (PSNR) in spite of hiding a larger number of secret bits in the image. In addition, to embed this large amount of secret information, at most only half of the total number of pixels in an image is used. Moreover, extraction of the secret information is independent of original cover image.
{"title":"Variable rate Steganography in gray scale digital images using neighborhood pixel information","authors":"Moazzam Hossain, Sadia Al Haque, Farhana Sharmin","doi":"10.1109/ICCIT.2009.5407128","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407128","url":null,"abstract":"In order to improve the security by providing the stego image with imperceptible quality, three different steganographic methods for gray level images are presented in this paper. Four Neighbors, Diagonal Neighbors and Eight Neighbors methods are employed in our scheme. These methods utilize a pixel's dependency on its neighborhood and psycho visual redundancy to ascertain the smooth areas and edged areas in the image. In smooth areas we embed three bits of secret information. In the edged areas, variable rate bits are embedded. From the experimental results it is seen that the proposed methods achieve a much higher visual quality as indicated by the high Peak Signal-to-Noise Ratio (PSNR) in spite of hiding a larger number of secret bits in the image. In addition, to embed this large amount of secret information, at most only half of the total number of pixels in an image is used. Moreover, extraction of the secret information is independent of original cover image.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131661069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-01DOI: 10.1109/ICCIT.2009.5407175
Md. Amjad Hossain, Md. Kowsar Hossain, M. Hashem
This paper proposes a Hybrid Real-coded Quantum Evolutionary Algorithm (HRCQEA) for optimizing complex functions on the basis of the concept of quantum computing such as qubits and superposition of states and Particle Swarm Optimization (PSO). It combines PSO with Real-coded Quantum Evolutionary Algorithm (RCQEA) to improve the performance of RCQEA. The main idea of HRCQEA is to embed the evolutionary equation of PSO in the evolutionary operator of RCQEA. In HRCQEA, each triploid chromosome represents a particle and the position of the particle is updated using Complementary Double Mutation Operator (CDMO) and Quantum Rotation Gate (QRG), which can make the balance between exploration and exploitation. Discrete Crossover (DC) is employed to expand the search space and Hill-climbing selection (HCS) helps to accelerate the convergence speed. Simulation results of four benchmark complex functions with high dimensions show that HRCQEA performs better than other algorithms in terms of ability to discover of global optimum.
{"title":"Hybrid Real-coded Quantum Evolutionary Algorithm based on particle swarm theory","authors":"Md. Amjad Hossain, Md. Kowsar Hossain, M. Hashem","doi":"10.1109/ICCIT.2009.5407175","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407175","url":null,"abstract":"This paper proposes a Hybrid Real-coded Quantum Evolutionary Algorithm (HRCQEA) for optimizing complex functions on the basis of the concept of quantum computing such as qubits and superposition of states and Particle Swarm Optimization (PSO). It combines PSO with Real-coded Quantum Evolutionary Algorithm (RCQEA) to improve the performance of RCQEA. The main idea of HRCQEA is to embed the evolutionary equation of PSO in the evolutionary operator of RCQEA. In HRCQEA, each triploid chromosome represents a particle and the position of the particle is updated using Complementary Double Mutation Operator (CDMO) and Quantum Rotation Gate (QRG), which can make the balance between exploration and exploitation. Discrete Crossover (DC) is employed to expand the search space and Hill-climbing selection (HCS) helps to accelerate the convergence speed. Simulation results of four benchmark complex functions with high dimensions show that HRCQEA performs better than other algorithms in terms of ability to discover of global optimum.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123279631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-01DOI: 10.1109/ICCIT.2009.5407291
S. Islam, M. Rokonuzzaman
Software Project management involves coordinating various aspects of a project in order to bring forth a positive result. There have been increasing challenges faced by Project Managers. The major challenges of project management include unrealistic deadlines, communication deficit, uncertain dependencies, failure to manage risk, not well-defined vision and goals, and invisibility of the final product. Meeting these challenges is very difficult and in many cases they are not met which eventually leads to the project failure. This situation is even worse where project dispersion is higher. Different studies reveal that an IT project is more likely to be unsuccessful than successful and 7 out of 10 IT projects fail in some respect. The process centric work breakdown structure (WBS) can play a very vital role in this regard to improve the situations significantly. Instead of hierarchical work breakdown structures as a tree, the process centric WBS takes whole software production process and splits whole process into smaller process units which take right set of inputs with the right set of standar, put right set of practices in place that eventualy produce the work products with expected standards and quality. This process centric work breakdown structure helps project Managers plan, estimate, monitor and control the project activities in greater accuracy and efficiency. In this article, Business Case Analysis phase of software projects has been taken as an example to demonstrate how process centric WBS can help for easing project management challenges.
{"title":"Process centric work breakdown structure for easing Software Project management challenges: Business case analysis example","authors":"S. Islam, M. Rokonuzzaman","doi":"10.1109/ICCIT.2009.5407291","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407291","url":null,"abstract":"Software Project management involves coordinating various aspects of a project in order to bring forth a positive result. There have been increasing challenges faced by Project Managers. The major challenges of project management include unrealistic deadlines, communication deficit, uncertain dependencies, failure to manage risk, not well-defined vision and goals, and invisibility of the final product. Meeting these challenges is very difficult and in many cases they are not met which eventually leads to the project failure. This situation is even worse where project dispersion is higher. Different studies reveal that an IT project is more likely to be unsuccessful than successful and 7 out of 10 IT projects fail in some respect. The process centric work breakdown structure (WBS) can play a very vital role in this regard to improve the situations significantly. Instead of hierarchical work breakdown structures as a tree, the process centric WBS takes whole software production process and splits whole process into smaller process units which take right set of inputs with the right set of standar, put right set of practices in place that eventualy produce the work products with expected standards and quality. This process centric work breakdown structure helps project Managers plan, estimate, monitor and control the project activities in greater accuracy and efficiency. In this article, Business Case Analysis phase of software projects has been taken as an example to demonstrate how process centric WBS can help for easing project management challenges.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116701127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-01DOI: 10.1109/ICCIT.2009.5407272
Yizhi Liu, Hongtao Xie
Pornographic images detection is necessary for us to filter out objectionable information on the Internet. Bag-of-visual-words (BoVW) based pornographic images detection is promising because it can compensate the defect of the traditional approach. However, there are many choices to construct visual-words which are crucial to the tradeoff between the speed and the performance. We propose a novel method of constructing SURF (speeded up robust features) visual-words in skin regions and combining it with color moments. The results show that the performance of SURF visual-words is better than that of SIFT (scale-invariant feature transform) visual-words and our method is more effective to detect pornographic images than many existing methods.
{"title":"Constructing SURF visual-words for pornographic images detection","authors":"Yizhi Liu, Hongtao Xie","doi":"10.1109/ICCIT.2009.5407272","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407272","url":null,"abstract":"Pornographic images detection is necessary for us to filter out objectionable information on the Internet. Bag-of-visual-words (BoVW) based pornographic images detection is promising because it can compensate the defect of the traditional approach. However, there are many choices to construct visual-words which are crucial to the tradeoff between the speed and the performance. We propose a novel method of constructing SURF (speeded up robust features) visual-words in skin regions and combining it with color moments. The results show that the performance of SURF visual-words is better than that of SIFT (scale-invariant feature transform) visual-words and our method is more effective to detect pornographic images than many existing methods.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122447203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-01DOI: 10.1109/ICCIT.2009.5407290
Morteza Alaeddini, A. Kardan
Nowadays, using business process management (BPM) systems is so prevalent through the world, so that deploying information systems (IS) based on this technology has become one of the application development methods in the new age of software engineering. Due to acquisition and using this technology in many organizations without awareness or program, that is the main reason which would fail this type of projects, we are looking for an efficient method in order to grain information systems, based on organization's business processes for the sake of defining the scope of their related software development projects, in the shortest time and with the lowest cost. We have started our scientific researches on this field in a few projects with the nature of information technology (IT) planning and gained noteworthy results that one of them is described in this paper as a case study. This new method will be used as the first step in defining project portfolios according to BPM approach, and in some actions like enterprise architecture (EA) or IT/IS planning.
{"title":"Using an old technique in a new technology — A novel method for defining the scope of ISs in BPM projects","authors":"Morteza Alaeddini, A. Kardan","doi":"10.1109/ICCIT.2009.5407290","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407290","url":null,"abstract":"Nowadays, using business process management (BPM) systems is so prevalent through the world, so that deploying information systems (IS) based on this technology has become one of the application development methods in the new age of software engineering. Due to acquisition and using this technology in many organizations without awareness or program, that is the main reason which would fail this type of projects, we are looking for an efficient method in order to grain information systems, based on organization's business processes for the sake of defining the scope of their related software development projects, in the shortest time and with the lowest cost. We have started our scientific researches on this field in a few projects with the nature of information technology (IT) planning and gained noteworthy results that one of them is described in this paper as a case study. This new method will be used as the first step in defining project portfolios according to BPM approach, and in some actions like enterprise architecture (EA) or IT/IS planning.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131361289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-01DOI: 10.1109/ICCIT.2009.5407141
Naushin Nower, A. Chowdhury
Multi valued logic synthesis is a very promising and affluent research area at present because of allowing designers to build much more efficient computers than the existing classical ones. Ternary logic synthesis research has got impetus in the recent years. Many existing literature are mainly perceptive to the realization of efficient ternary reversible processors. This research is based on the design of a reversible systolic array, which is one of the best examples of parallel processing, using micro level ternary Toffoli gate. General architecture of the ternary reversible systolic array multiplier is shown along with example. Lower bound for the garbage outputs produced in the proposed design and the quantum cost of the entire circuit is calculated here to prove the compactness of the design.
{"title":"Realization of systolic array using ternary reversible gates","authors":"Naushin Nower, A. Chowdhury","doi":"10.1109/ICCIT.2009.5407141","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407141","url":null,"abstract":"Multi valued logic synthesis is a very promising and affluent research area at present because of allowing designers to build much more efficient computers than the existing classical ones. Ternary logic synthesis research has got impetus in the recent years. Many existing literature are mainly perceptive to the realization of efficient ternary reversible processors. This research is based on the design of a reversible systolic array, which is one of the best examples of parallel processing, using micro level ternary Toffoli gate. General architecture of the ternary reversible systolic array multiplier is shown along with example. Lower bound for the garbage outputs produced in the proposed design and the quantum cost of the entire circuit is calculated here to prove the compactness of the design.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128000915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-01DOI: 10.1109/ICCIT.2009.5407320
Nur Afroza Khurshid, M. Islam, M. Amin
In this paper, both equal power and water filling models are simulated for comparison of their performance in a multiple-input multiple-output environment. The effects of fast fading and the shadowing effects have been incorporated in the models. Minimum eigenvalue required for successful transmission for individual link is evaluated from the probability density functions of eigenvalue and equivalent uncoupled multiple-input multiple-output link. Impact of the number of antenna elements of an array on the minimum eigenvalue of an uncoupled channel is analyzed based on probability density function of eigenvalue of the channel matrix. The analysis shows that the cutoff eigenvalue decreases with increase in the number of antenna elements and signal to noise ratio of the received signal.
{"title":"Performance evaluation of MIMO system incorporating water filling model and minimum eigenvalue constraints","authors":"Nur Afroza Khurshid, M. Islam, M. Amin","doi":"10.1109/ICCIT.2009.5407320","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407320","url":null,"abstract":"In this paper, both equal power and water filling models are simulated for comparison of their performance in a multiple-input multiple-output environment. The effects of fast fading and the shadowing effects have been incorporated in the models. Minimum eigenvalue required for successful transmission for individual link is evaluated from the probability density functions of eigenvalue and equivalent uncoupled multiple-input multiple-output link. Impact of the number of antenna elements of an array on the minimum eigenvalue of an uncoupled channel is analyzed based on probability density function of eigenvalue of the channel matrix. The analysis shows that the cutoff eigenvalue decreases with increase in the number of antenna elements and signal to noise ratio of the received signal.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"181 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131846299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-01DOI: 10.1109/ICCIT.2009.5407296
M. Islam, M. Shakib, N. Misran
A wideband, low cross-polarization patch antenna fed by meandering probe is presented in this paper. The patch antenna consists of inverted patch structure with air-filled dielectric, slotted patch and meandering probe. The composite effect of integrating these techniques and by introducing the proposed patch, offer a low profile, broadband, high gain, and low cross-polarization level. The results for the VSWR and co-and cross-polarization patterns are presented. The antenna operating the band of 1.84–2.29 GHz shows an impedance bandwidth (2∶1 VSWR) of 22% and a gain of 10.6 dBi with a gain variation of 1.02 dBi. Good radiation characteristics, including cross-polarization level in xz- and yz-plane are −50dB and −23 dB respectively, have been obtained.
{"title":"Design of meandering probe fed microstrip patch antenna for wireless communication system","authors":"M. Islam, M. Shakib, N. Misran","doi":"10.1109/ICCIT.2009.5407296","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407296","url":null,"abstract":"A wideband, low cross-polarization patch antenna fed by meandering probe is presented in this paper. The patch antenna consists of inverted patch structure with air-filled dielectric, slotted patch and meandering probe. The composite effect of integrating these techniques and by introducing the proposed patch, offer a low profile, broadband, high gain, and low cross-polarization level. The results for the VSWR and co-and cross-polarization patterns are presented. The antenna operating the band of 1.84–2.29 GHz shows an impedance bandwidth (2∶1 VSWR) of 22% and a gain of 10.6 dBi with a gain variation of 1.02 dBi. Good radiation characteristics, including cross-polarization level in xz- and yz-plane are −50dB and −23 dB respectively, have been obtained.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"66 SP1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114121011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-01DOI: 10.1109/ICCIT.2009.5407302
M. Hossain, A. A. Khan, S. Majumdar, R. Ahmed
Proper analysis and good design are essential for the successful implementation of any computer aided system. The sensitivity of the Tax return system amplifies the significance of analysis and design by many fold. Developed countries have achieved high tax return rates by introducing simple, Internet-based, computer-aided Tax return systems. Valuable insights can be gained by analyzing the tax re- turn systems of the developed countries, which can serve as a base for designing an effective tax return system for an underdeveloped country. In this work we analyze the relative merits and demerits of individual tax return systems in United Kingdom (UK), Canada and Bangladesh. Based on this analysis we propose a design for automating individual tax return system for the National Board of Revenue, Bangladesh.
{"title":"Analysis and design of individual Tax return systems in Bangladesh","authors":"M. Hossain, A. A. Khan, S. Majumdar, R. Ahmed","doi":"10.1109/ICCIT.2009.5407302","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407302","url":null,"abstract":"Proper analysis and good design are essential for the successful implementation of any computer aided system. The sensitivity of the Tax return system amplifies the significance of analysis and design by many fold. Developed countries have achieved high tax return rates by introducing simple, Internet-based, computer-aided Tax return systems. Valuable insights can be gained by analyzing the tax re- turn systems of the developed countries, which can serve as a base for designing an effective tax return system for an underdeveloped country. In this work we analyze the relative merits and demerits of individual tax return systems in United Kingdom (UK), Canada and Bangladesh. Based on this analysis we propose a design for automating individual tax return system for the National Board of Revenue, Bangladesh.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117159551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-01DOI: 10.1109/ICCIT.2009.5407152
M. A. Hossain, M. Quaddus
Radio Frequency Identification (RFID) technology is at its early stage of adoption in Bangladesh with a few business applications and pilot studies. It is expected that the next stage will be the organizational adoption and diffusion in more applications inspired by business cases. Eventually, the adoption will drive this technology into ‘extended use’ stage provided that the adopters and users are ‘satisfied’. At this moment the RFID initiative is discrete in Bangladesh and do not have any long-term strategy leading into implementation-to-diffusion process. Without having a clear strategy to achieve large scale diffusion discrete RFID adoption may not inspire the process in reaching the full potential of RFID. This study, therefore, investigates the factors influencing the adoption diffusion of RFID and its extended use process; and then proposes a conceptual framework. The framework is an objective integration of innovation-diffusion theory and expectation-confirmation theory, with some logical modifications. It posits that while adoption of RFID is important but the long-term viability of RFID and its ultimate success depends on its continued and extended use, which is judged against ‘satisfaction’ and ‘performance’ derived from RFID. The implications of the framework in the context of Bangladesh are discussed.
{"title":"An adoption-diffusion model for RFID applications in Bangladesh","authors":"M. A. Hossain, M. Quaddus","doi":"10.1109/ICCIT.2009.5407152","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407152","url":null,"abstract":"Radio Frequency Identification (RFID) technology is at its early stage of adoption in Bangladesh with a few business applications and pilot studies. It is expected that the next stage will be the organizational adoption and diffusion in more applications inspired by business cases. Eventually, the adoption will drive this technology into ‘extended use’ stage provided that the adopters and users are ‘satisfied’. At this moment the RFID initiative is discrete in Bangladesh and do not have any long-term strategy leading into implementation-to-diffusion process. Without having a clear strategy to achieve large scale diffusion discrete RFID adoption may not inspire the process in reaching the full potential of RFID. This study, therefore, investigates the factors influencing the adoption diffusion of RFID and its extended use process; and then proposes a conceptual framework. The framework is an objective integration of innovation-diffusion theory and expectation-confirmation theory, with some logical modifications. It posits that while adoption of RFID is important but the long-term viability of RFID and its ultimate success depends on its continued and extended use, which is judged against ‘satisfaction’ and ‘performance’ derived from RFID. The implications of the framework in the context of Bangladesh are discussed.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"272 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123125222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}